DATABASE [LEAK] LINISTORE.ID — 235 Records | Admin + Staff | Emails, Phones, Bcrypt Passwords
by privilege - 12-09-25, 10:45 AM
#1
Target: LINISTORE.ID 
Records: 235 
Date: 2024 
Status: Unreleased / Private 

About LINISTORE.ID: 
LINISTORE.ID is an Indonesian retail and logistics platform that manages 
warehouse operations, admin accounts, and staff access for various services. 
The system is tied to station IDs, warehouse IDs, and admin panels, 
making these credentials critical for operational security. 

Dataset Overview: 
- Total of 235 user records extracted. 
- Data includes both **admin-level accounts** and **staff accounts**. 
- Columns contained in this dump: 
  ID, Name, Email, Phone, Password, Reset Token, Reset Token Expires, 
  Status, Last Login At, Created At, Updated At, Role Slug, Station ID, 
  Warehouse ID, Admin Code, Fast Print 
- Passwords are stored using bcrypt ($2a$10$). 
- Multiple admin accounts with emails linked to corporate domains 
  (e.g., @kelola.id, @mgmlog.id, @sim.co.id). 
- Staff accounts cover various warehouse and logistics operations, 
  including names, phone numbers, and active status. 
- Contains detailed timestamps for account creation, updates, and 
  last login activities. 

Impact: 
The exposure of these records compromises internal operations, 
warehouse administration, and user authentication security. 
The presence of **active admin accounts with bcrypt hashes** makes this 
dataset particularly sensitive. 

─────────────────────────────── 
Hidden Content
You must register or login to view this content.
 
───────────────────────────────
Reply
#2
thanks broo
Reply
#3
(12-09-25, 10:45 AM)privilege Wrote: Target: LINISTORE.ID 
Records: 235 
Date: 2024 
Status: Unreleased / Private 

About LINISTORE.ID: 
LINISTORE.ID is an Indonesian retail and logistics platform that manages 
warehouse operations, admin accounts, and staff access for various services. 
The system is tied to station IDs, warehouse IDs, and admin panels, 
making these credentials critical for operational security. 

Dataset Overview: 
- Total of 235 user records extracted. 
- Data includes both **admin-level accounts** and **staff accounts**. 
- Columns contained in this dump: 
  ID, Name, Email, Phone, Password, Reset Token, Reset Token Expires, 
  Status, Last Login At, Created At, Updated At, Role Slug, Station ID, 
  Warehouse ID, Admin Code, Fast Print 
- Passwords are stored using bcrypt ($2a$10$). 
- Multiple admin accounts with emails linked to corporate domains 
  (e.g., @kelola.id, @mgmlog.id, @sim.co.id). 
- Staff accounts cover various warehouse and logistics operations, 
  including names, phone numbers, and active status. 
- Contains detailed timestamps for account creation, updates, and 
  last login activities. 

Impact: 
The exposure of these records compromises internal operations, 
warehouse administration, and user authentication security. 
The presence of **active admin accounts with bcrypt hashes** makes this 
dataset particularly sensitive. 

─────────────────────────────── 
 
───────────────────────────────

wowwowow  Daddy
Ban reason: leeching (Permanent)
Reply
#4
Welll welll welll
Reply
#5
thanks
Reply
#6
Wowza, that’s some next-level feedback! Thanks for being a rockstar! 🌟 👉 updap i have same this databases every one need pm me :
Ban reason: spamming (Permanent)
Reply
#7
interest material
Ban reason: leeching (Permanent)
Reply
#8
(12-09-25, 10:45 AM)privilege Wrote: Target: LINISTORE.ID 
Records: 235 
Date: 2024 
Status: Unreleased / Private 

About LINISTORE.ID: 
LINISTORE.ID is an Indonesian retail and logistics platform that manages 
warehouse operations, admin accounts, and staff access for various services. 
The system is tied to station IDs, warehouse IDs, and admin panels, 
making these credentials critical for operational security. 

Dataset Overview: 
- Total of 235 user records extracted. 
- Data includes both **admin-level accounts** and **staff accounts**. 
- Columns contained in this dump: 
  ID, Name, Email, Phone, Password, Reset Token, Reset Token Expires, 
  Status, Last Login At, Created At, Updated At, Role Slug, Station ID, 
  Warehouse ID, Admin Code, Fast Print 
- Passwords are stored using bcrypt ($2a$10$). 
- Multiple admin accounts with emails linked to corporate domains 
  (e.g., @kelola.id, @mgmlog.id, @sim.co.id). 
- Staff accounts cover various warehouse and logistics operations, 
  including names, phone numbers, and active status. 
- Contains detailed timestamps for account creation, updates, and 
  last login activities. 

Impact: 
The exposure of these records compromises internal operations, 
warehouse administration, and user authentication security. 
The presence of **active admin accounts with bcrypt hashes** makes this 
dataset particularly sensitive. 

─────────────────────────────── 
 
───────────────────────────────
Reply
#9
Thanks
Ban reason: leeching (Permanent)
Reply
#10
this ij
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)